首页 > 最新文献

2012 Tenth Annual International Conference on Privacy, Security and Trust最新文献

英文 中文
Collaborative trust evaluation for wiki security wiki安全性的协同信任评估
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297938
K. Lindberg, C. Jensen
Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created and maintained by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system, but at the same time, anyone can also introduce errors into these documents, by accident or on purpose. A security model for wiki-style authoring systems has previously been proposed. This model is based on both static and dynamic document access controls that enforce a simple integrity based security policy. In this paper, we present a new policy for the existing wiki security model, which provides a higher degree of parameterization and adaptability. The new policy is analyzed and compared to the original policy. Our evaluation shows that this new policy provides stronger security when the number of malicious and colluding users is low, but it has a clearly defined level of tolerance in terms of the amount of work required by an attacker to achieve a given probability of violating the policy. Efforts beyond that level, can allow such users to take control of the system, but this is true for all soft security systems. We show that the system parameters can be tuned so that the amount of work required by malicious and colluding users to reach this level is well beyond most attackers' capabilities.
Wiki系统是更通用的开放协作创作系统的一个子类,其中的内容由用户社区创建和维护。任何人编辑内容的能力,同时也是他们的长处和弱点。任何人都可以编写提高维基系统价值的文档,但与此同时,任何人也可以无意或有意地在这些文档中引入错误。维基风格的创作系统的安全模型先前已经被提出。该模型基于静态和动态文档访问控制,这些控制强制执行简单的基于完整性的安全策略。本文针对现有的wiki安全模型提出了一种新的策略,该策略提供了更高程度的参数化和适应性。对新政策进行分析,并与原政策进行比较。我们的评估表明,当恶意用户和串通用户的数量较低时,这个新策略提供了更强的安全性,但就攻击者为实现给定的违反策略的概率所需的工作量而言,它具有明确定义的容忍度。超过这个级别的努力可以允许这样的用户控制系统,但这对所有软安全系统都是正确的。我们展示了可以调整系统参数,以便恶意和串通用户达到此级别所需的工作量远远超出大多数攻击者的能力。
{"title":"Collaborative trust evaluation for wiki security","authors":"K. Lindberg, C. Jensen","doi":"10.1109/PST.2012.6297938","DOIUrl":"https://doi.org/10.1109/PST.2012.6297938","url":null,"abstract":"Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created and maintained by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system, but at the same time, anyone can also introduce errors into these documents, by accident or on purpose. A security model for wiki-style authoring systems has previously been proposed. This model is based on both static and dynamic document access controls that enforce a simple integrity based security policy. In this paper, we present a new policy for the existing wiki security model, which provides a higher degree of parameterization and adaptability. The new policy is analyzed and compared to the original policy. Our evaluation shows that this new policy provides stronger security when the number of malicious and colluding users is low, but it has a clearly defined level of tolerance in terms of the amount of work required by an attacker to achieve a given probability of violating the policy. Efforts beyond that level, can allow such users to take control of the system, but this is true for all soft security systems. We show that the system parameters can be tuned so that the amount of work required by malicious and colluding users to reach this level is well beyond most attackers' capabilities.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-preserving resource evaluation in social networks 社交网络中的隐私保护资源评估
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297919
F. Buccafurri, Lidia Fotia, G. Lax
In new generation social networks, we expect that the demand of tools allowing the user to effectively control privacy, without relying on the provider trustworthiness, will be more and more increasing. A lot of precious information is currently released by users with no privacy control whenever they evaluate resources, which, for example, is done in Facebook through the “Like Button”. A mechanism allowing the user to express her preferences fully preserving her privacy is thus desired, especially if it is able to protect user privacy also in case of untrustworthy social network provider. In this paper, we propose a solution to this problem, based on a DHT-based P2P social network and on a cryptographic protocol relying on partially blind digital signatures. The protocol is shown to be a solution to the trade-off between feasibility and security, since it guarantees the needed security requirements without including the complex features of existing e-voting systems.
在新一代的社交网络中,我们预计对允许用户有效控制隐私的工具的需求将越来越多,而不依赖于提供商的可信度。目前,用户在评估资源时,很多宝贵的信息都是在没有隐私控制的情况下发布的,比如在Facebook上,用户通过“喜欢”按钮来评估资源。因此,需要一种允许用户表达其偏好并充分保护其隐私的机制,特别是如果它能够在不值得信任的社交网络提供商的情况下保护用户隐私。在本文中,我们提出了一种基于dht的P2P社交网络和基于部分盲数字签名的加密协议的解决方案。该协议被证明是可行性和安全性之间权衡的解决方案,因为它保证了所需的安全需求,而不包括现有电子投票系统的复杂功能。
{"title":"Privacy-preserving resource evaluation in social networks","authors":"F. Buccafurri, Lidia Fotia, G. Lax","doi":"10.1109/PST.2012.6297919","DOIUrl":"https://doi.org/10.1109/PST.2012.6297919","url":null,"abstract":"In new generation social networks, we expect that the demand of tools allowing the user to effectively control privacy, without relying on the provider trustworthiness, will be more and more increasing. A lot of precious information is currently released by users with no privacy control whenever they evaluate resources, which, for example, is done in Facebook through the “Like Button”. A mechanism allowing the user to express her preferences fully preserving her privacy is thus desired, especially if it is able to protect user privacy also in case of untrustworthy social network provider. In this paper, we propose a solution to this problem, based on a DHT-based P2P social network and on a cryptographic protocol relying on partially blind digital signatures. The protocol is shown to be a solution to the trade-off between feasibility and security, since it guarantees the needed security requirements without including the complex features of existing e-voting systems.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The role of trust in computer security
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297950
C. Jensen
Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason about system security.
只提供摘要形式。传统的安全技术是基于对系统使用环境的许多假设。这包括对立法和契约框架的执行、特定技术的限制以及社会和宗教规范对人类行为的约束的假设。然而,这些假设中的大多数都是隐含的,当系统的环境发生变化时,例如,当系统在互联网上以全球规模使用时,它们就会失效。本次演讲指出了当前安全技术中的这些隐含假设,并展示了其中有多少涉及对人类或系统代理的信任。我们认为,对信任做出明确的假设是未来系统安全的基本要求,并论证了当我们希望对系统安全进行推理时,为什么计算信任的形式化是必要的。
{"title":"The role of trust in computer security","authors":"C. Jensen","doi":"10.1109/PST.2012.6297950","DOIUrl":"https://doi.org/10.1109/PST.2012.6297950","url":null,"abstract":"Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason about system security.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124111252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Advice and trust in games of choice 选择游戏中的建议和信任
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297934
C. Buntain, J. Golbeck, Dana S. Nau, Sarit Kraus
This work provides a game theoretic framework through which one can study the different trust and mitigation strategies a decision maker can employ when soliciting advice or input from a potentially self-interested third-party. The framework supports a single decision maker's interacting with an arbitrary number of either honest or malicious (and malicious in varying ways) advisors. We include some preliminary results on the analysis of this framework in some constrained instances and propose several avenues of future work.
这项工作提供了一个博弈论框架,通过这个框架,人们可以研究决策者在向潜在的自利第三方征求建议或输入时可以采用的不同信任和缓解策略。该框架支持单个决策者与任意数量的诚实或恶意(以各种方式恶意)顾问进行交互。我们在一些受限的情况下对该框架进行了一些初步的分析,并提出了未来工作的几个途径。
{"title":"Advice and trust in games of choice","authors":"C. Buntain, J. Golbeck, Dana S. Nau, Sarit Kraus","doi":"10.1109/PST.2012.6297934","DOIUrl":"https://doi.org/10.1109/PST.2012.6297934","url":null,"abstract":"This work provides a game theoretic framework through which one can study the different trust and mitigation strategies a decision maker can employ when soliciting advice or input from a potentially self-interested third-party. The framework supports a single decision maker's interacting with an arbitrary number of either honest or malicious (and malicious in varying ways) advisors. We include some preliminary results on the analysis of this framework in some constrained instances and propose several avenues of future work.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using conventional reasoning techniques for self-organising systems 使用自组织系统的常规推理技术
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297952
Graeme Smith, J. Sanders
Self-organising systems have become important relatively recently. It is frequently claimed that their complex nature necessitates new formalisms to express and reason about them. In this paper the opposite view is taken. Following Back's use of action systems to express a distributed system as an initialised possibly nonterminating loop, here two simple but representative case studies of self-organising systems are explored using only conventional techniques. The first deals with the configuration of an ad hoc network and shows how safety and liveness can be accurately expressed with an initialised loop. The second involves, like many self-organising systems, probabilistic behaviour and it is shown that existing techniques suffice to establish the system behaviour. In conclusion, the techniques illustrated can be used to provide a higher level of assurance than is possible with simulation alone.
自组织系统最近才变得重要起来。人们经常声称,它们的复杂性需要新的形式来表达和推理它们。本文采取了相反的观点。继Back使用动作系统将分布式系统表示为初始化的可能不终止的循环之后,这里仅使用常规技术探索了两个简单但具有代表性的自组织系统案例研究。第一部分讨论了自组织网络的配置,并展示了如何用初始化的循环准确地表达安全性和活动性。像许多自组织系统一样,第二种涉及概率行为,并表明现有技术足以建立系统行为。总之,所说明的技术可以用来提供比单独模拟更高级别的保证。
{"title":"Using conventional reasoning techniques for self-organising systems","authors":"Graeme Smith, J. Sanders","doi":"10.1109/PST.2012.6297952","DOIUrl":"https://doi.org/10.1109/PST.2012.6297952","url":null,"abstract":"Self-organising systems have become important relatively recently. It is frequently claimed that their complex nature necessitates new formalisms to express and reason about them. In this paper the opposite view is taken. Following Back's use of action systems to express a distributed system as an initialised possibly nonterminating loop, here two simple but representative case studies of self-organising systems are explored using only conventional techniques. The first deals with the configuration of an ad hoc network and shows how safety and liveness can be accurately expressed with an initialised loop. The second involves, like many self-organising systems, probabilistic behaviour and it is shown that existing techniques suffice to establish the system behaviour. In conclusion, the techniques illustrated can be used to provide a higher level of assurance than is possible with simulation alone.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123153326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combining the setbase approach with negative databases 将setbase方法与负数据库相结合
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297948
J. Bringer, H. Chabanne, Olivier Cipiere
In 2009, Shamir proposed the setbase approach to protect the privacy of biometric data during ID documents issuance. One year later, Bringer and Chabanne introduced negative databases for biometric data. In this paper, we show that negative database techniques can also be applied to the setbase approach to enforce some of its security characteristics.
2009年,Shamir提出了setbase方法来保护身份证件签发过程中生物特征数据的隐私。一年后,Bringer和Chabanne为生物特征数据引入了阴性数据库。在本文中,我们展示了反向数据库技术也可以应用于setbase方法,以增强其某些安全特性。
{"title":"Combining the setbase approach with negative databases","authors":"J. Bringer, H. Chabanne, Olivier Cipiere","doi":"10.1109/PST.2012.6297948","DOIUrl":"https://doi.org/10.1109/PST.2012.6297948","url":null,"abstract":"In 2009, Shamir proposed the setbase approach to protect the privacy of biometric data during ID documents issuance. One year later, Bringer and Chabanne introduced negative databases for biometric data. In this paper, we show that negative database techniques can also be applied to the setbase approach to enforce some of its security characteristics.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards requirements for trust management 对信任管理的需求
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297935
Mark Vinkovits
Research in the field of Trust Management is blooming producing new Trust Frameworks within short time intervals. However, trust researchers do not develop distributed systems. Most developers are not familiar with security procedures and therefore often introduce other security vulnerabilities during implementation. We wish to provide a solution for system designers and developers for applying Trust Management. As a first step of our work we investigated how our users understand the application of trust and reputation in distributed systems. During focus group workshops we collected a set of initial requirements. We learnt that users are familiar with the benefits gained by Trust Management but had not enough knowledge about its application.
信任管理领域的研究正在蓬勃发展,在很短的时间间隔内产生新的信任框架。然而,信任研究人员并不开发分布式系统。大多数开发人员不熟悉安全过程,因此在实现过程中经常引入其他安全漏洞。我们希望为系统设计者和开发者提供一个应用信任管理的解决方案。作为我们工作的第一步,我们调查了我们的用户如何理解分布式系统中信任和声誉的应用。在焦点小组研讨会期间,我们收集了一组初始需求。我们了解到,用户熟悉信任管理带来的好处,但对其应用的了解不够。
{"title":"Towards requirements for trust management","authors":"Mark Vinkovits","doi":"10.1109/PST.2012.6297935","DOIUrl":"https://doi.org/10.1109/PST.2012.6297935","url":null,"abstract":"Research in the field of Trust Management is blooming producing new Trust Frameworks within short time intervals. However, trust researchers do not develop distributed systems. Most developers are not familiar with security procedures and therefore often introduce other security vulnerabilities during implementation. We wish to provide a solution for system designers and developers for applying Trust Management. As a first step of our work we investigated how our users understand the application of trust and reputation in distributed systems. During focus group workshops we collected a set of initial requirements. We learnt that users are familiar with the benefits gained by Trust Management but had not enough knowledge about its application.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An integrated key management and secure routing framework for Mobile Ad-Hoc Networks 移动Ad-Hoc网络的集成密钥管理和安全路由框架
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297925
Shushan Zhao, R. Kent, A. Aggarwal
Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads to KM-SR interdependency cycle problem. In this paper, we propose an integrated KM-SR scheme that addresses KM-SR interdependency cycle problem. By using identity based cryptography (IBC), this scheme provides security features including confidentiality, integrity, authentication, freshness, and non-repudiation. Compared to symmetric cryptography, traditional asymmetric cryptography and previous IBC schemes, this scheme has improvements in many aspects. We provide theoretical proof of the security of the scheme and demonstrate the efficiency of the scheme with practical simulation.
密钥管理(KM)和安全路由(SR)是移动自组织网络(manet)的两个最重要的问题,但以前的解决方案往往将它们分开考虑。这就导致了KM-SR相互依赖循环的问题。在本文中,我们提出了一个集成的KM-SR方案来解决KM-SR相互依赖循环问题。通过使用基于身份的加密技术(IBC),该方案提供了包括机密性、完整性、身份验证、新鲜度和不可否认性在内的安全特性。与对称密码、传统的非对称密码和以往的IBC方案相比,该方案在许多方面都有改进。从理论上证明了该方案的安全性,并通过实际仿真验证了该方案的有效性。
{"title":"An integrated key management and secure routing framework for Mobile Ad-Hoc Networks","authors":"Shushan Zhao, R. Kent, A. Aggarwal","doi":"10.1109/PST.2012.6297925","DOIUrl":"https://doi.org/10.1109/PST.2012.6297925","url":null,"abstract":"Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads to KM-SR interdependency cycle problem. In this paper, we propose an integrated KM-SR scheme that addresses KM-SR interdependency cycle problem. By using identity based cryptography (IBC), this scheme provides security features including confidentiality, integrity, authentication, freshness, and non-repudiation. Compared to symmetric cryptography, traditional asymmetric cryptography and previous IBC schemes, this scheme has improvements in many aspects. We provide theoretical proof of the security of the scheme and demonstrate the efficiency of the scheme with practical simulation.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0) SIPPA-2.0 -具有隐私保证的安全信息处理(2.0版)
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297916
Arun Prakash, K. krishnan, B. Sy
We present a two-party secure information processing protocol referred to as SIPPA-2.0 - targeted towards privacy preserving biometric data comparison and reconstruction. The original intention of SIPPA as reported previously is to enable private data comparison and reconstruction between a client and a server when (a) the client possesses some data that are “sufficiently similar” to that of the server, and (b) the server provides a scalar helper data to facilitate private data reconstruction by the client. In SIPPA-2.0, private data comparison and reconstruction are based on new theoretical results and a novel secure computation protocol referred to as SLSSP. These new results allow us to design and develop the much improved SIPPA and SLSSP protocols guaranteeing (a) security under semi-malicious model rather than just semi-honest model, and (b) privacy assurance with arbitrary reconstruction accuracy controllable by the server. Security analysis proving SLSSP secure under the semi-honest and semi-malicious models is presented. SIPPA-2.0 is applied to enable privacy preserving fingerprint comparison; where two parties can compare their fingerprint samples and can obtain a similarity score without revealing their raw fingerprint to each other. Experimental results on the accuracy of fingerprint matching and the run-time performance are also reported.
我们提出了一种两方安全信息处理协议,称为SIPPA-2.0,旨在保护隐私的生物特征数据比较和重建。如前所述,SIPPA的初衷是在以下情况下实现客户机和服务器之间的私有数据比较和重建:(a)客户机拥有与服务器“足够相似”的一些数据,以及(b)服务器提供标量辅助数据以促进客户机的私有数据重建。在SIPPA-2.0中,私有数据的比较和重构是基于新的理论结果和一种新的安全计算协议(SLSSP)。这些新结果使我们能够设计和开发改进的SIPPA和SLSSP协议,以保证(a)在半恶意模型下而不仅仅是半诚实模型下的安全性,以及(b)由服务器控制的任意重构精度的隐私保证。通过安全分析证明了SLSSP在半诚实和半恶意模型下的安全性。采用SIPPA-2.0实现保密指纹比对;在不向对方透露原始指纹的情况下,双方可以比较各自的指纹样本并获得相似度分数。最后给出了指纹匹配精度和运行时性能的实验结果。
{"title":"SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0)","authors":"Arun Prakash, K. krishnan, B. Sy","doi":"10.1109/PST.2012.6297916","DOIUrl":"https://doi.org/10.1109/PST.2012.6297916","url":null,"abstract":"We present a two-party secure information processing protocol referred to as SIPPA-2.0 - targeted towards privacy preserving biometric data comparison and reconstruction. The original intention of SIPPA as reported previously is to enable private data comparison and reconstruction between a client and a server when (a) the client possesses some data that are “sufficiently similar” to that of the server, and (b) the server provides a scalar helper data to facilitate private data reconstruction by the client. In SIPPA-2.0, private data comparison and reconstruction are based on new theoretical results and a novel secure computation protocol referred to as SLSSP. These new results allow us to design and develop the much improved SIPPA and SLSSP protocols guaranteeing (a) security under semi-malicious model rather than just semi-honest model, and (b) privacy assurance with arbitrary reconstruction accuracy controllable by the server. Security analysis proving SLSSP secure under the semi-honest and semi-malicious models is presented. SIPPA-2.0 is applied to enable privacy preserving fingerprint comparison; where two parties can compare their fingerprint samples and can obtain a similarity score without revealing their raw fingerprint to each other. Experimental results on the accuracy of fingerprint matching and the run-time performance are also reported.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116768644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions 通过隐藏策略、隐藏凭证和隐藏决策实现保护隐私的访问控制
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297915
M. Harbach, S. Fahl, Michael Brenner, T. Muders, Matthew Smith
The growing adoption of cloud technology in sensitive application domains, such as medicine, gives rise to new problems in maintaining the privacy of the involved parties during authorisation. In such domains, an honest but curious service provider can derive sensitive information purely from the authorisation process. In this paper, we present a detailed discussion of this rising problem including a concrete example and argue the need for the combination of hidden credentials, hidden policies and hidden decisions. We then show that mechanisms explored in previous work only cover individual aspects of this problem, but do not achieve a comprehensive solution without making restrictive assumptions on the resources, policies or subjects to be protected. As a first step towards solving this problem, we introduce an abstract foundation for using homomorphic cryptography to provide the required combination of privacy as a wrapper for other access control (AC) mechanisms. We achieve hidden policies, hidden credentials and even hidden access control decisions, so that the subject of an AC request only learns whether or not access was granted. Meanwhile, the provider of a resource learns nothing at the policy decision point and only access frequencies for individual resources at the policy enforcement point. We postulate that this is the maximum achievable level of protection in the authorisation process, without making restrictive assumptions on the resources, policies or subjects to be protected. Once homomorphic cryptography achieves satisfactory performance, our model can be used to transparently add this protection to other access control models.
在医疗等敏感应用领域越来越多地采用云技术,在授权期间维护有关各方的隐私方面产生了新的问题。在这些领域中,诚实但好奇的服务提供者可以纯粹从授权过程中获取敏感信息。在本文中,我们对这一日益突出的问题进行了详细的讨论,包括一个具体的例子,并论证了隐藏凭证、隐藏策略和隐藏决策相结合的必要性。然后,我们表明,在以前的工作中探索的机制只涵盖了这个问题的各个方面,但如果没有对要保护的资源、政策或主体做出限制性假设,就无法实现全面的解决方案。作为解决这个问题的第一步,我们引入了一个抽象基础,用于使用同态加密来提供所需的隐私组合,作为其他访问控制(AC)机制的包装。我们实现了隐藏策略、隐藏凭证甚至隐藏访问控制决策,因此AC请求的主体只知道是否授予了访问权限。同时,资源的提供者在策略决策点什么也学不到,在策略实施点只学习到单个资源的访问频率。我们假设这是在授权过程中可达到的最大保护水平,而不对要保护的资源、政策或主体进行限制性假设。一旦同态加密实现了令人满意的性能,我们的模型就可以透明地将这种保护添加到其他访问控制模型中。
{"title":"Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions","authors":"M. Harbach, S. Fahl, Michael Brenner, T. Muders, Matthew Smith","doi":"10.1109/PST.2012.6297915","DOIUrl":"https://doi.org/10.1109/PST.2012.6297915","url":null,"abstract":"The growing adoption of cloud technology in sensitive application domains, such as medicine, gives rise to new problems in maintaining the privacy of the involved parties during authorisation. In such domains, an honest but curious service provider can derive sensitive information purely from the authorisation process. In this paper, we present a detailed discussion of this rising problem including a concrete example and argue the need for the combination of hidden credentials, hidden policies and hidden decisions. We then show that mechanisms explored in previous work only cover individual aspects of this problem, but do not achieve a comprehensive solution without making restrictive assumptions on the resources, policies or subjects to be protected. As a first step towards solving this problem, we introduce an abstract foundation for using homomorphic cryptography to provide the required combination of privacy as a wrapper for other access control (AC) mechanisms. We achieve hidden policies, hidden credentials and even hidden access control decisions, so that the subject of an AC request only learns whether or not access was granted. Meanwhile, the provider of a resource learns nothing at the policy decision point and only access frequencies for individual resources at the policy enforcement point. We postulate that this is the maximum achievable level of protection in the authorisation process, without making restrictive assumptions on the resources, policies or subjects to be protected. Once homomorphic cryptography achieves satisfactory performance, our model can be used to transparently add this protection to other access control models.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125330983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2012 Tenth Annual International Conference on Privacy, Security and Trust
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1